# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
600a0fd4ccf1f3291a42bd927fa9a76cc82d65066bceab4962313c91f8e16f65
Pseudo Output
f035265c6ee9d946d477c52e12eb048eb3e68f1c29cdfbcfb93e9f50e7da3951
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cc00b43b911748dcd444a4b31e8b992fb15c2e5a68e47499365d3c9404a83973
Commitment
fa395e2e5c48b630a1572ddea338fc09db9d1f514f92d52c54cd4c169d813818
Range Proof
672 bytes (Bulletproof)
Memo
8fb52cabbf1fff305a29849d297c50a9eb29dcd61e8d3e76a517038c6dc4b16168c0328a30aaba8aa6d3a8186858f89cfae590d43f03ac6a48f10335f67af3ffbee11ac891e4adbab36eed010388db5324f0c8f87a5215e0d9c0d6404d4125e9a9693070beb7718ee8489b3b1b6b2e3b947bc53c265063c517906109e0b0f741 (encrypted)
Stealth Address
7cf48265f861d1adeee109e2914a66cf79f7e39d29747052c011294661794b0f
Commitment
e6d3f7134e53098ef63bf9fc7ece643c777e4d58da00f7fe4b7c36a4ffc8845f
Range Proof
672 bytes (Bulletproof)
Memo
2c51b48f3006e2b6927304ca7761493ea82897f452141e99c1dd34a4d7edf27a37b461193a779f10eaf0bc1969a2662fd764ca8babe8c2351b0dabcd92a9af2b8de8348b21cfc08e64567f9a54d730f7bb41d2a4f2afda65e10a204646ce8461274913ae4f1f46938f9941b1d3a0137fe77ef588083b62914f86e51c4a663b39 (encrypted)
Stealth Address
5e478afd0dd8b4eabd65768b643a258eda4acb2da2490dee06c3a7e1702c8b6b
Commitment
a0ca5058bf76998bfecfa806a43eade3ee476f3f1f67d84933330afcd291a551
Range Proof
672 bytes (Bulletproof)
Memo
1dbd82ae60cd52c5a1a678bb4b846617dadb7a4456ecacb1bc2d091798280e7f6109d7cd3bedfac39e8756fa08e973a0b4e94ee6433c0ecc108e9265b6341ac0c85f5f9f79269fd879be08250ee6d228db9e730430bbdbea29486e20970c94bb6ce6e9401beabcf9dd7295fde6dc40cf7a2cad2c93899fc55cca1823f397b935 (encrypted)